A. This is normal network traffic.B. 123.120.110.212 is infected with a Trojan.C. 172.29.0.109 is infected with a worm.D. 172.29.0.109 is infected with a Trojan.

Answer: A

QUESTION 22A security analyst is creating baseline system images to remediate vulnerabilities found in different operating systems. Each image needs to be scanned before it is deployed.The security analyst must ensure the configurations match industry standard benchmarks and the process can be repeated frequently.Which of the following vulnerability options would BEST create the process requirements?

QUESTION 23A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

A. TCPB. SMTPC. ICMPD. ARP

Answer: C

QUESTION 24An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port.Which of the following should the analyst use?

A. WiresharkB. QualysC. netstatD. nmapE. ping

Answer: C

QUESTION 25In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis.The last completed scan of the network returned 5,682 possible vulnerabilities.The Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues.Which of the following is the BEST way to proceed?

A. Attempt to identify all false positives and exceptions, and then resolve all remaining items.B. Hold off on additional scanning until the current list of vulnerabilities have been resolved.C. Place assets that handle PHI in a sandbox environment, and then resolve all vulnerabilities.D. Reduce the scan to items identified as critical in the asset inventory, and resolve these issues first.

Answer: D

QUESTION 26An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host.After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation.After removing the rootkit and flashing the BIOS to a known good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?

QUESTION 28A cybersecurity analyst has received a report that multiple systems are experiencing slowness as a result of a DDoS attack.Which of the following would be the BEST action for the cybersecurity analyst to perform?

QUESTION 29A security professional is analyzing the results of a network utilization report. The report includes the following information:

Which of the following servers needs further investigation?

A. hr.dbprod.01B. R&D.file.srvr.01C. mrktg.file.srvr.02D. web.srvr.03

Answer: B

QUESTION 30A cybersecurity analyst has several SIEM event logs to review for possible APT activity.The analyst was given several items that include lists of indicators for both IP addresses and domains.Which of the following actions is the BEST approach for the analyst to perform?

A. Use the IP addresses to search through the event logs.B. Analyze the trends of the events while manually reviewing to see if any of the indicators match.C. Create an advanced query that includes all of the indicators, and review any of the matches.D. Scan for vulnerabilities with exploits known to have been used by an APT.

QUESTION 11A security analyst is adding input to the incident response communication plan.A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline.Which of the following should the analyst recommend to the company officer?

A. The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.B. Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.C. An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non-compromised recourse.D. The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation. Read more

2017 May CompTIA Official New Released CS0-001 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Although the CompTIA CS0-001 dumps are very popular, Lead2pass offers a wide range of CompTIA CS0-001 exam dumps and will continue to release new study guide to meet the rapidly increasing demand of the IT industry.

QUESTION 2 After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed. This is an example of:

QUESTION 3 A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free up disk space. These log files are needed by the security team to analyze the health of the virtual machines. Which of the following compensating controls would help prevent this from reoccurring? (Select two.)

QUESTION 4 A security analyst received a compromised workstation. The workstation’s hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

A. Make a copy of the hard drive. B. Use write blockers. C. Runrm -Rcommand to create a hash. D. Install it on a different machine and explore the content.

Answer: B

QUESTION 5 File integrity monitoring states the following files have been changed without a written request or approved change. The following change has been made:

chmod 777 -Rv /usr

Which of the following may be occurring?

A. The ownership pf /usr has been changed to the current user. B. Administrative functions have been locked from users. C. Administrative commands have been made world readable/writable. D. The ownership of/usr has been changed to the root user.

Answer: C

QUESTION 6 A security analyst has created an image of a drive from an incident. Which of the following describes what the analyst should do NEXT?

A. The analyst should create a backup of the drive and then hash the drive. B. The analyst should begin analyzing the image and begin to report findings. C. The analyst should create a hash of the image and compare it to the original drive’s hash. D. The analyst should create a chain of custody document and notify stakeholders.

Answer: C

QUESTION 7 An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist. Which of the following steps should be taken to assist in the development of the disaster recovery plan?

QUESTION 8 A company wants to update its acceptable use policy (AUP) to ensure it relates to the newly implemented password standard, which requires sponsored authentication of guest wireless devices. Which of the following is MOST likely to be incorporated in the AUP?

A. Sponsored guest passwords must be at least ten characters in length and contain a symbol. B. The corporate network should have a wireless infrastructure that uses open authentication standards. C. Guests using the wireless network should provide valid identification when registering their wireless devices. D. The network should authenticate all guest users using 802.1x backed by a RADIUS or LDAP server.

Answer: C

QUESTION 9 An analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions. Which of the following technologies meet the compatibility requirement? (Select three.)

A. 3DES B. AES C. IDEA D. PKCS E. PGP F. SSL/TLS G. TEMPEST

Answer: BDF

QUESTION 10 After completing a vulnerability scan, the following output was noted:

Lead2pass offers the latest CompTIA CS0-001 dumps and a good range of CompTIA Certification CS0-001 answers. Most of our CompTIA CS0-001 exam dumps are exclusively prepared by the best brains and highly skilled professionals from the IT domain to ensure 100% pass in your CompTIA CS0-001 Exam.